Exam 11: Network Security
Exam 1: Introduction to Data Communications79 Questions
Exam 2: Application Layer99 Questions
Exam 3: Physical Layer143 Questions
Exam 4: Data Link Layer98 Questions
Exam 5: Network and Transport Layers117 Questions
Exam 6: Network Design76 Questions
Exam 7: Wired and Wireless Local Area Networks141 Questions
Exam 8: Backbone Networks68 Questions
Exam 9: Wide Area Networks77 Questions
Exam 10: The Internet73 Questions
Exam 11: Network Security127 Questions
Exam 12: Network Management69 Questions
Select questions type
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:
(Multiple Choice)
4.7/5
(34)
Decryption is the process of converting plaintext into ciphertext.
(True/False)
4.8/5
(29)
What is a packet level firewall as compared to a NAT firewall and as compared to an applications layer firewall?
(Essay)
4.8/5
(42)
A hacker gaining access to organizational data files and resources is an example of an) ____________ threat.
(Multiple Choice)
4.8/5
(34)
When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
(True/False)
4.8/5
(42)
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
(True/False)
4.8/5
(37)
_______________ is an encryption standard that uses a total of 168 bits as the key.
(Multiple Choice)
4.7/5
(34)
Secure Sockets Layer is an encryption standard designed for use on the Web.
(True/False)
4.8/5
(41)
Which of the following is not a type of intrusion prevention system?
(Multiple Choice)
5.0/5
(42)
To snare intruders, many organizations now use _________ techniques.
(Multiple Choice)
4.7/5
(41)
Which of the following type of media is least susceptible to eavesdropping?
(Multiple Choice)
4.8/5
(41)
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
(True/False)
4.9/5
(37)
A brute-force attack is a method of trying to guess the correct password by trying every possible key.
(True/False)
4.8/5
(25)
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?
(Multiple Choice)
4.8/5
(35)
A denial-of-service attack occurs when someone external blocks access to your network.
(True/False)
4.9/5
(36)
Which of the following is not true about one-time passwords?
(Multiple Choice)
4.7/5
(36)
Showing 41 - 60 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)